LOTUS PANDA (32fafa69-fe3c-49db-afd4-aac2664bcf0d) |
Threat Actor |
Lotus Blossom - G0030 (88b7dbc2-32d3-4e31-af2f-3fc24e1582d7) |
Intrusion Set |
1 |
Elise - S0081 (7551188b-8f91-4d34-8350-0d0c57b2b913) |
Malware |
Lotus Blossom - G0030 (88b7dbc2-32d3-4e31-af2f-3fc24e1582d7) |
Intrusion Set |
2 |
Emissary - S0082 (0f862b01-99da-47cc-9bdb-db4a86a95bb1) |
Malware |
Lotus Blossom - G0030 (88b7dbc2-32d3-4e31-af2f-3fc24e1582d7) |
Intrusion Set |
2 |
Elise - S0081 (7551188b-8f91-4d34-8350-0d0c57b2b913) |
Malware |
Dynamic-link Library Injection - T1055.001 (f4599aa0-4f85-4a32-80ea-fc39dc965945) |
Attack Pattern |
3 |
Elise - S0081 (7551188b-8f91-4d34-8350-0d0c57b2b913) |
Malware |
Ingress Tool Transfer - T1105 (e6919abc-99f9-4c6c-95a5-14761e7b2add) |
Attack Pattern |
3 |
Elise - S0081 (7551188b-8f91-4d34-8350-0d0c57b2b913) |
Malware |
Standard Encoding - T1132.001 (04fd5427-79c7-44ea-ae13-11b24778ff1c) |
Attack Pattern |
3 |
Elise - S0081 (7551188b-8f91-4d34-8350-0d0c57b2b913) |
Malware |
Timestomp - T1070.006 (47f2d673-ca62-47e9-929b-1b0be9657611) |
Attack Pattern |
3 |
Elise - S0081 (7551188b-8f91-4d34-8350-0d0c57b2b913) |
Malware |
Local Account - T1087.001 (25659dd6-ea12-45c4-97e6-381e3e4b593e) |
Attack Pattern |
3 |
Elise - S0081 (7551188b-8f91-4d34-8350-0d0c57b2b913) |
Malware |
Elise Backdoor (d70fd29d-590e-4ed5-b72f-6ce0142019c6) |
Tool |
3 |
Elise - S0081 (7551188b-8f91-4d34-8350-0d0c57b2b913) |
Malware |
Match Legitimate Name or Location - T1036.005 (1c4e5d32-1fe9-4116-9d9d-59e3925bd6a2) |
Attack Pattern |
3 |
Elise - S0081 (7551188b-8f91-4d34-8350-0d0c57b2b913) |
Malware |
Process Discovery - T1057 (8f4a33ec-8b1f-4b80-a2f6-642b2e479580) |
Attack Pattern |
3 |
Elise - S0081 (7551188b-8f91-4d34-8350-0d0c57b2b913) |
Malware |
Registry Run Keys / Startup Folder - T1547.001 (9efb1ea7-c37b-4595-9640-b7680cd84279) |
Attack Pattern |
3 |
Elise - S0081 (7551188b-8f91-4d34-8350-0d0c57b2b913) |
Malware |
System Information Discovery - T1082 (354a7f88-63fb-41b5-a801-ce3b377b36f1) |
Attack Pattern |
3 |
Elise - S0081 (7551188b-8f91-4d34-8350-0d0c57b2b913) |
Malware |
Encrypted/Encoded File - T1027.013 (0d91b3c0-5e50-47c3-949a-2a796f04d144) |
Attack Pattern |
3 |
Elise - S0081 (7551188b-8f91-4d34-8350-0d0c57b2b913) |
Malware |
System Network Configuration Discovery - T1016 (707399d6-ab3e-4963-9315-d9d3818cd6a0) |
Attack Pattern |
3 |
Elise - S0081 (7551188b-8f91-4d34-8350-0d0c57b2b913) |
Malware |
Rundll32 - T1218.011 (045d0922-2310-4e60-b5e4-3302302cb3c5) |
Attack Pattern |
3 |
Elise - S0081 (7551188b-8f91-4d34-8350-0d0c57b2b913) |
Malware |
Elise (3477a25d-e04b-475e-8330-39f66c10cc01) |
Malpedia |
3 |
Elise - S0081 (7551188b-8f91-4d34-8350-0d0c57b2b913) |
Malware |
Local Data Staging - T1074.001 (1c34f7aa-9341-4a48-bfab-af22e51aca6c) |
Attack Pattern |
3 |
Elise - S0081 (7551188b-8f91-4d34-8350-0d0c57b2b913) |
Malware |
File Deletion - T1070.004 (d63a3fb8-9452-4e9d-a60a-54be68d5998c) |
Attack Pattern |
3 |
Elise - S0081 (7551188b-8f91-4d34-8350-0d0c57b2b913) |
Malware |
Symmetric Cryptography - T1573.001 (24bfaeba-cb0d-4525-b3dc-507c77ecec41) |
Attack Pattern |
3 |
Elise - S0081 (7551188b-8f91-4d34-8350-0d0c57b2b913) |
Malware |
Windows Service - T1543.003 (2959d63f-73fd-46a1-abd2-109d7dcede32) |
Attack Pattern |
3 |
Elise - S0081 (7551188b-8f91-4d34-8350-0d0c57b2b913) |
Malware |
File and Directory Discovery - T1083 (7bc57495-ea59-4380-be31-a64af124ef18) |
Attack Pattern |
3 |
Elise - S0081 (7551188b-8f91-4d34-8350-0d0c57b2b913) |
Malware |
System Service Discovery - T1007 (322bad5a-1c49-4d23-ab79-76d641794afa) |
Attack Pattern |
3 |
Elise - S0081 (7551188b-8f91-4d34-8350-0d0c57b2b913) |
Malware |
Web Protocols - T1071.001 (df8b2a25-8bdf-4856-953c-a04372b1c161) |
Attack Pattern |
3 |
System Information Discovery - T1082 (354a7f88-63fb-41b5-a801-ce3b377b36f1) |
Attack Pattern |
Emissary - S0082 (0f862b01-99da-47cc-9bdb-db4a86a95bb1) |
Malware |
3 |
Encrypted/Encoded File - T1027.013 (0d91b3c0-5e50-47c3-949a-2a796f04d144) |
Attack Pattern |
Emissary - S0082 (0f862b01-99da-47cc-9bdb-db4a86a95bb1) |
Malware |
3 |
System Network Configuration Discovery - T1016 (707399d6-ab3e-4963-9315-d9d3818cd6a0) |
Attack Pattern |
Emissary - S0082 (0f862b01-99da-47cc-9bdb-db4a86a95bb1) |
Malware |
3 |
Binary Padding - T1027.001 (5bfccc3f-2326-4112-86cc-c1ece9d8a2b5) |
Attack Pattern |
Emissary - S0082 (0f862b01-99da-47cc-9bdb-db4a86a95bb1) |
Malware |
3 |
Symmetric Cryptography - T1573.001 (24bfaeba-cb0d-4525-b3dc-507c77ecec41) |
Attack Pattern |
Emissary - S0082 (0f862b01-99da-47cc-9bdb-db4a86a95bb1) |
Malware |
3 |
Emissary - S0082 (0f862b01-99da-47cc-9bdb-db4a86a95bb1) |
Malware |
Dynamic-link Library Injection - T1055.001 (f4599aa0-4f85-4a32-80ea-fc39dc965945) |
Attack Pattern |
3 |
Emissary - S0082 (0f862b01-99da-47cc-9bdb-db4a86a95bb1) |
Malware |
Rundll32 - T1218.011 (045d0922-2310-4e60-b5e4-3302302cb3c5) |
Attack Pattern |
3 |
Group Policy Discovery - T1615 (1b20efbf-8063-4fc3-a07d-b575318a301b) |
Attack Pattern |
Emissary - S0082 (0f862b01-99da-47cc-9bdb-db4a86a95bb1) |
Malware |
3 |
Windows Service - T1543.003 (2959d63f-73fd-46a1-abd2-109d7dcede32) |
Attack Pattern |
Emissary - S0082 (0f862b01-99da-47cc-9bdb-db4a86a95bb1) |
Malware |
3 |
Emissary - S0082 (0f862b01-99da-47cc-9bdb-db4a86a95bb1) |
Malware |
Ingress Tool Transfer - T1105 (e6919abc-99f9-4c6c-95a5-14761e7b2add) |
Attack Pattern |
3 |
Emissary - S0082 (0f862b01-99da-47cc-9bdb-db4a86a95bb1) |
Malware |
System Service Discovery - T1007 (322bad5a-1c49-4d23-ab79-76d641794afa) |
Attack Pattern |
3 |
Windows Command Shell - T1059.003 (d1fcf083-a721-4223-aedf-bf8960798d62) |
Attack Pattern |
Emissary - S0082 (0f862b01-99da-47cc-9bdb-db4a86a95bb1) |
Malware |
3 |
Emissary - S0082 (0f862b01-99da-47cc-9bdb-db4a86a95bb1) |
Malware |
Web Protocols - T1071.001 (df8b2a25-8bdf-4856-953c-a04372b1c161) |
Attack Pattern |
3 |
Local Groups - T1069.001 (a01bf75f-00b2-4568-a58f-565ff9bf202b) |
Attack Pattern |
Emissary - S0082 (0f862b01-99da-47cc-9bdb-db4a86a95bb1) |
Malware |
3 |
Registry Run Keys / Startup Folder - T1547.001 (9efb1ea7-c37b-4595-9640-b7680cd84279) |
Attack Pattern |
Emissary - S0082 (0f862b01-99da-47cc-9bdb-db4a86a95bb1) |
Malware |
3 |
Process Injection - T1055 (43e7dc91-05b2-474c-b9ac-2ed4fe101f4d) |
Attack Pattern |
Dynamic-link Library Injection - T1055.001 (f4599aa0-4f85-4a32-80ea-fc39dc965945) |
Attack Pattern |
4 |
Standard Encoding - T1132.001 (04fd5427-79c7-44ea-ae13-11b24778ff1c) |
Attack Pattern |
Data Encoding - T1132 (cc7b8c4e-9be0-47ca-b0bb-83915ec3ee2f) |
Attack Pattern |
4 |
Timestomp - T1070.006 (47f2d673-ca62-47e9-929b-1b0be9657611) |
Attack Pattern |
Indicator Removal - T1070 (799ace7f-e227-4411-baa0-8868704f2a69) |
Attack Pattern |
4 |
Local Account - T1087.001 (25659dd6-ea12-45c4-97e6-381e3e4b593e) |
Attack Pattern |
Account Discovery - T1087 (72b74d71-8169-42aa-92e0-e7b04b9f5a08) |
Attack Pattern |
4 |
Elise Backdoor (d70fd29d-590e-4ed5-b72f-6ce0142019c6) |
Tool |
Elise (3477a25d-e04b-475e-8330-39f66c10cc01) |
Malpedia |
4 |
Masquerading - T1036 (42e8de7b-37b2-4258-905a-6897815e58e0) |
Attack Pattern |
Match Legitimate Name or Location - T1036.005 (1c4e5d32-1fe9-4116-9d9d-59e3925bd6a2) |
Attack Pattern |
4 |
Registry Run Keys / Startup Folder - T1547.001 (9efb1ea7-c37b-4595-9640-b7680cd84279) |
Attack Pattern |
Boot or Logon Autostart Execution - T1547 (1ecb2399-e8ba-4f6b-8ba7-5c27d49405cf) |
Attack Pattern |
4 |
Encrypted/Encoded File - T1027.013 (0d91b3c0-5e50-47c3-949a-2a796f04d144) |
Attack Pattern |
Obfuscated Files or Information - T1027 (b3d682b6-98f2-4fb0-aa3b-b4df007ca70a) |
Attack Pattern |
4 |
System Binary Proxy Execution - T1218 (457c7820-d331-465a-915e-42f85500ccc4) |
Attack Pattern |
Rundll32 - T1218.011 (045d0922-2310-4e60-b5e4-3302302cb3c5) |
Attack Pattern |
4 |
Local Data Staging - T1074.001 (1c34f7aa-9341-4a48-bfab-af22e51aca6c) |
Attack Pattern |
Data Staged - T1074 (7dd95ff6-712e-4056-9626-312ea4ab4c5e) |
Attack Pattern |
4 |
File Deletion - T1070.004 (d63a3fb8-9452-4e9d-a60a-54be68d5998c) |
Attack Pattern |
Indicator Removal - T1070 (799ace7f-e227-4411-baa0-8868704f2a69) |
Attack Pattern |
4 |
Encrypted Channel - T1573 (b8902400-e6c5-4ba2-95aa-2d35b442b118) |
Attack Pattern |
Symmetric Cryptography - T1573.001 (24bfaeba-cb0d-4525-b3dc-507c77ecec41) |
Attack Pattern |
4 |
Windows Service - T1543.003 (2959d63f-73fd-46a1-abd2-109d7dcede32) |
Attack Pattern |
Create or Modify System Process - T1543 (106c0cf6-bf73-4601-9aa8-0945c2715ec5) |
Attack Pattern |
4 |
Application Layer Protocol - T1071 (355be19c-ffc9-46d5-8d50-d6a036c675b6) |
Attack Pattern |
Web Protocols - T1071.001 (df8b2a25-8bdf-4856-953c-a04372b1c161) |
Attack Pattern |
4 |
Obfuscated Files or Information - T1027 (b3d682b6-98f2-4fb0-aa3b-b4df007ca70a) |
Attack Pattern |
Binary Padding - T1027.001 (5bfccc3f-2326-4112-86cc-c1ece9d8a2b5) |
Attack Pattern |
4 |
Windows Command Shell - T1059.003 (d1fcf083-a721-4223-aedf-bf8960798d62) |
Attack Pattern |
Command and Scripting Interpreter - T1059 (7385dfaf-6886-4229-9ecd-6fd678040830) |
Attack Pattern |
4 |
Local Groups - T1069.001 (a01bf75f-00b2-4568-a58f-565ff9bf202b) |
Attack Pattern |
Permission Groups Discovery - T1069 (15dbf668-795c-41e6-8219-f0447c0e64ce) |
Attack Pattern |
4 |